Skip to main content

previous disabled Page of 12
and
  1. No Access

    Chapter and Conference Paper

    Three-Tier Clustering: An Online Citation Clustering System

    In this paper, we present a three tier clustering method where data objects are described by a number of feature dimensions. Using the approach, similarity along each feature dimension of objects are first com...

    Haifeng Jiang, Wenwu Lou, Wei Wang in Advances in Web-Age Information Management (2001)

  2. No Access

    Chapter and Conference Paper

    Constraint Shape Model Using Edge Constraint and Gabor Wavelet Based Search

    Constraint Shape Model is proposed to extract facial feature using two different search methods for contour points and control points individually. In the proposed algorithm, salient facial features, such as t...

    Baochang Zhang, Wen Gao, Shiguang Shan in Audio- and Video-Based Biometric Person Au… (2003)

  3. No Access

    Chapter and Conference Paper

    Grid Workflow Based on Performance Evaluation

    As the complexity of Grid applications increase, it becomes more important and urgent to provide grid workflow to construct and manage the applications. The grid workflow based on dynamic scheduling and perfor...

    Shao-hua Zhang, Yu-** Wu, Ning Gu, Wei Wang in Grid and Cooperative Computing (2004)

  4. No Access

    Chapter and Conference Paper

    Ad Hoc Debugging Environment for Grid Applications

    Debugging can help programmers to locate the reasons for incorrect program behaviors. The dynamic and heterogeneous characteristics of computational grids make it much harder to debug grid applications. In thi...

    Wei Wang, Binxing Fang, Hongli Zhang in Grid and Cooperative Computing - GCC 2004 (2004)

  5. No Access

    Chapter and Conference Paper

    Answering Approximate Range Aggregate Queries on OLAP Data Cubes with Probabilistic Guarantees

    Approximate range aggregate queries are one of the most frequent and useful kinds of queries for Decision Support Systems (DSS). Traditionally, sampling- based techniques have been proposed to tackle this prob...

    Alfredo Cuzzocrea, Wei Wang, Ugo Matrangolo in Data Warehousing and Knowledge Discovery (2004)

  6. No Access

    Chapter and Conference Paper

    Network Performance Measurement Methodologies in PGMS

    PGMS (P2P-based Grid Monitoring System) is a Grid monitoring system, which is based on peer-to-peer technology and GMA specification. Network performance measurement is a key component of monitoring system. Al...

    Yuanzhe Yao, Binxing Fang, Hongli Zhang in Grid and Cooperative Computing - GCC 2004 … (2004)

  7. No Access

    Chapter and Conference Paper

    Modeling Dynamic System by Recurrent Neural Network with State Variables

    A study is performed to investigate the state evolution of a kind of recurrent neural network. The state variable in the neural system summarize the information of external excitation and initial state, and de...

    Min Han, Zhiwei Shi, Wei Wang in Advances in Neural Networks - ISNN 2004 (2004)

  8. No Access

    Chapter and Conference Paper

    ANNE: An Efficient Framework on View Selection Problem

    ROLAP is used to answer queries for analysis support on the data stored in the data warehouse. To fulfill this purpose rapidly and correctly, ROLAP always precompute some views in the data warehouse. However, ...

    Yong Yan, Peng Wang, Chen Wang, Haofeng Zhou in Advanced Web Technologies and Applications (2004)

  9. No Access

    Chapter and Conference Paper

    A Novel Individual Blood Glucose Control Model Based on Mixture of Experts Neural Networks

    An individual blood glucose control model (IBGCM) based on the Mixture of Experts (MOE) neural networks algorithm was designed to improve the diabetic care. MOE was first time used to integrate multiple indivi...

    Wei Wang, Zheng-Zhong Bian, Lan-Feng Yan in Advances in Neural Networks - ISNN 2004 (2004)

  10. No Access

    Chapter and Conference Paper

    A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security

    Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. In this paper, a new intrusion detection method based on P...

    Wei Wang, **aohong Guan, **angliang Zhang in Advances in Neural Networks - ISNN 2004 (2004)

  11. No Access

    Chapter and Conference Paper

    iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow

    Workflow is referred to automatic business process, and current involving methods mainly depend on traditional centralized C/S infrastructure and email systems. As far as we know, the existing methods have fol...

    Min Yang, Zun** Cheng, Ning Shang, Mi Zhang in Grid and Cooperative Computing - GCC 2004 (2004)

  12. No Access

    Chapter and Conference Paper

    CLINCH: Clustering Incomplete High-Dimensional Data for Data Mining Application

    Clustering is a common technique in data mining to discover hidden patterns from massive datasets. With the development of privacy-maintaining data mining application, clustering incomplete high-dimensional da...

    Zun** Cheng, Ding Zhou, Chen Wang in Web Technologies Research and Development … (2005)

  13. No Access

    Chapter and Conference Paper

    Localized Recursive Estimation in Wireless Sensor Networks

    This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...

    Bang Wang, Kee Chaing Chua, Vikram Srinivasan in Mobile Ad-hoc and Sensor Networks (2005)

  14. No Access

    Chapter and Conference Paper

    Constraint-Based Graph Mining in Large Database

    Currently, constraints are increasingly considered as a kind of means of user- or expert-control for filtering those unsatisfied and redundant patterns rapidly during the web mining process. Recent work has hi...

    Chen Wang, Yongtai Zhu, Tianyi Wu, Wei Wang in Web Technologies Research and Development … (2005)

  15. No Access

    Chapter

    Mining High-Dimensional Data

    With the rapid growth of computational biology and e-commerce applications, high-dimensional data becomes very common. Thus, mining high-dimensional data is an urgent problem of great practical importance. How...

    Wei Wang, Jiong Yang in Data Mining and Knowledge Discovery Handbook (2005)

  16. No Access

    Chapter and Conference Paper

    Multisensors Information Fusion with Neural Networks for Noninvasive Blood Glucose Detection

    A multisensors information fusion model (MIFM) based on the Mixture of Experts (ME) neural networks was designed to fuse the multi-sensors signals for infrared noninvasive blood glucose detection. ME algorithm...

    Wei Wang, Lanfeng Yan, Baowei Liu, Heng Zhang in Advances in Neural Networks – ISNN 2005 (2005)

  17. No Access

    Chapter and Conference Paper

    Parallel Web Spiders for Cooperative Information Gathering

    Web spider is a widely used approach to obtain information for search engines. As the size of the Web grows, it becomes a natural choice to parallelize the spider’s crawling process. This paper presents a para...

    Jiewen Luo, Zhongzhi Shi, Maoguang Wang in Grid and Cooperative Computing - GCC 2005 (2005)

  18. No Access

    Chapter and Conference Paper

    Worst and Best Information Exposure Paths in Wireless Sensor Networks

    This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...

    Bang Wang, Kee Chaing Chua, Wei Wang in Mobile Ad-hoc and Sensor Networks (2005)

  19. No Access

    Chapter and Conference Paper

    Labeling Scheme and Structural Joins for Graph-Structured XML Data

    When XML documents are modeled as graphs, many challenging research issues arise. In particular, query processing for graph-structured XML data brings new challenges because traditional structural join methods...

    Hongzhi Wang, Wei Wang, Xuemin Lin in Web Technologies Research and Development … (2005)

  20. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)

previous disabled Page of 12